Which of the following post-exploitation activities allows a penetration tester to maintain persistent access in a compromised system?
Maintaining persistent access in a compromised system is a crucial goal for a penetration tester after achieving initial access. Here's an explanation of each option and why creating registry keys is the preferred method:
Creating registry keys (Answer: A):
Advantages: This method is stealthy and can be effective in maintaining access over long periods, especially on Windows systems.
Example: Adding a new entry to the HKLM\Software\Microsoft\Windows\CurrentVersion\Run registry key to execute a malicious script upon system boot.
Drawbacks: This method is less stealthy and can be easily detected by network monitoring tools. It also requires an open port, which might be closed or filtered by firewalls.
Executing a process injection (Option C):
Drawbacks: While effective for evading detection, it doesn't inherently provide persistence. The injected code will typically be lost when the process terminates or the system reboots.
Setting up a reverse SSH connection (Option D):
Drawbacks: This method can be useful for maintaining a session but is less reliable for long-term persistence. It can be disrupted by network changes or monitoring tools.
Conclusion: Creating registry keys is the most effective method for maintaining persistent access in a compromised system, particularly in Windows environments, due to its stealthiness and reliability.
Installing a bind shell (Option B):
Hannah
11 days agoJuan
13 days agoStaci
16 days agoViva
17 days agoNicolette
20 days agoPhuong
2 hours agoDorothy
21 days agoLucina
24 days agoGregoria
2 hours agoTien
1 months agoFrancine
2 days agoLeontine
4 days agoDean
18 days agoJudy
1 months agoArlyne
13 days agoStefania
18 days agoStefania
19 days agoMagnolia
29 days agoJosephine
2 months agoMertie
2 months agoKenneth
29 days agoEdmond
1 months agoKing
2 months agoLavina
2 months ago